Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Physic
Q:
Developing steps to recover from a disaster is one step of risk management.
Q:
Describe three of the disadvantages to wireless networks.
Q:
There are many types of networks, classified by the geographic area they cover. Choose three, and describe the scope of their access.
Q:
Describe some of the advantages and disadvantages of networks.
Q:
A(n) ____________________ is a cell phone that can also do e-mail, gaming, and Web browsing.
Q:
A(n) ____________________ is used to connect both the cable modem and a TV to a single CATV cable.
Q:
Biz, com, edu, and gov are all examples of top-level ____________________.
Q:
204.127.129.001 is an example of a(n) ____________________ address.
Q:
A(n) ____________________ is an abrupt and unwanted variation of signals traveling over the Internet.
Q:
____________________ is a software utility that sends a signal to an Internet address and waits for a reply.
Q:
A(n) ____________________ system, such as telephones, has a lower transmission capacity.
Q:
____________________ light carries data signals for short distances and with a clear line of sight.
Q:
A(n) ____________________ is a network device that connects several nodes of a LAN.
Q:
A(n) ____________________ is a device that converts signals from a computer into signals that can travel over a network.
Q:
A(n) ____________________ topology connects all devices in a circle.
Q:
A(n) ____________________ topology connects devices through a common backbone cable.
Q:
Each connection point on a network is called a(n) ____________________.
Q:
A ____________________/server network consists of one computer acting as the host to workstations.
Q:
____________________ measures the capacity of a network for carrying data.
Q:
Bob Metcalfe called his plan for transporting data over a network of computers a(n) ____________________.
Q:
A(n) ____ is the range of service for a public Wi-Fi.a. LAN c. WANb. hotspot d. WiMAX
Q:
Which of the following is NOT true about WAP-enabled devices?a. They have small, low-resolution screens. c. They contain a microbrowser.b. They are portable. d. They use co-axial cables.
Q:
The connection shown in the above figure uses ____ to connect to the Internet.a. cables c. POTSb. satellites d. Bluetooth
Q:
In order to offer TV and Internet access, cable's bandwidth is divided among all of the following activities EXCEPT ____ signalsa. outgoing data c. voicebandb. incoming data d. television
Q:
If your cable modem uses ____ circuitry, it can be connected to your computer using only a USB cable.a. Ethernet c. ISDNb. CATV d. infrared
Q:
Which of the following is true about DSL lines?a. DSL lines cannot be used for voice calls. c. Signal strength is not determined by location.b. ISDN lines are faster. d. DSL is an example of an always-on connection.
Q:
The figure above shows a computer connecting to the Internet through: ____.a. a cable modem c. circuit switchingb. POTS d. the Internet backbone
Q:
In the URL www.course.com, the domain name is ____.a. course c. course.comb. com d. www
Q:
A(n) ____ IP address is permanently assigned.a. dynamic c. logicalb. domain d. static
Q:
____ is a software utility that can indicate whether a site is up, or if a packet was lost in transmission.a. Bluetooth c. Tracerouteb. POTS d. Ping
Q:
The method currently used to measure modem speed is called ____.a. baud rate c. frequencyb. bits per second d. DSL
Q:
Which of the following is NOT true about Wi-Fi technology?a. A license is needed to operate a wireless network. c. Wi-Fi networks use radio waves to transmit data.b. War driving is illegal. d. The range of a Wi-Fi is 25 to 150 feet.
Q:
The use of unsecured wireless networks by hackers is called ____.a. WEP c. LAN-jackingb. evil twins d. colliding
Q:
Which of the following is NOT true about Ethernet technology?a. CSMA/CD protocol detects collisions and resets the network. c. Ethernets are difficult to implement and maintain.b. Ethernets are the standard for wired networks. d. Most Ethernet hubs serve as routers.
Q:
____ is a technology that establishes a dedicated, private link between telephones for the duration of a call.a. packet switching c. TCP/IPb. handshaking d. circuit switching
Q:
A packet is:a. a parcel of data sent over a network. c. a connection point on a network.b. a type of network protocol. d. another term for a byte.
Q:
A(n) ____ on a satellite receives, amplifies, and resubmits signals to the ground station.a. transceiver c. transponderb. hub d. repeater
Q:
A(n) ____ cable is high capacity, and is the type used for cable television.a. fiber-optic c. USBb. coaxial d. twisted-pair
Q:
Which of the following is NOT a type of modem?a. cable c. wirelessb. voiceband d. repeater
Q:
A(n) ____ sends and receives signals in a wireless network.a. transceiver c. repeaterb. Ethernet card d. modem
Q:
The network shown in the figure above is an example of a(n) ____ network.a. star c. treeb. bus d. mesh
Q:
Networks that use different topologies and technologies can be connected using a(n) ____.a. bridge c. gatewayb. node d. driver
Q:
A(n) ____ topology features a central connection point for all workstations and peripheral devices.a. ring c. treeb. star d. bus
Q:
The classifications PAN, LAN, WAN, NAN, and MAN indicate the ____ of a network.a. geographical scope c. physical topologyb. bandwidth d. communications protocol
Q:
A network where workstations store network data and every computer is equal is called a ____ network.a. local area c. peer-to-peerb. star d. narrowband
Q:
Which of the following is a disadvantage to networks?a. increased software costs c. unauthorized accessb. increased hardware costs d. data sharing
Q:
A(n) ____ shares hardware and software among authorized users.a. network c. hyperlinkb. Internet d. transmitter
Q:
The connection shown in the above figure can come in either digital or fixed-wireless.
Q:
The connection shown in the above figure uses satellites to connect to the Internet.
Q:
A disadvantage of WAP-enabled devices is that they are not easily portable.
Q:
The range of wireless network coverage is called a Wi-Fi hotspot.
Q:
With an always-on connection, your computer is susceptible to attack even when it is turned off.
Q:
CATV cable has enough bandwidth to support TV channels and data flowing up and downstream.
Q:
A head-end is where cabling systems branch out in order to reach consumers' homes.
Q:
DSL connections are fast, because data doesn"t need to be switched from analog to digital.
Q:
Circuit switching is less efficient than packet switching.
Q:
When you use an ISP to access the Internet, as shown in the above figure, data travels from your local telephone switch through your ISP, then to the Internet.
Q:
The top-level domains biz and com are both unrestricted and usually used for businesses.
Q:
A temporarily assigned IP address is called a static IP address.
Q:
The organization ICANN reviews and rates Web site content.
Q:
ISPs can provide services that allow your computer to function as an Internet server.
Q:
Most Internet connections have a faster upstream than downstream transmission rate.
Q:
Traceroute is a software utility that records the path of a packet as it travels from your computer to its destination.
Q:
To access the Internet, you connect your computer directly to the Internet backbone.
Q:
Blu-ray is a short-range wireless network technology that connects devices such as mice, keyboards, and printers.
Q:
Wireless networks are great for computers such as notebooks and tablets that do not need to be constantly plugged into an outlet.
Q:
A collision occurs when two signals travel over the network at the same time.
Q:
Ethernet is the leading technology for wireless networks.
Q:
Voice over IP and Internet telephony are the same thing.
Q:
An Ethernet is an intranet that provides private, external access.
Q:
Protocols are rules that ensure accurate and orderly transmission and reception of data.
Q:
Data in a wired network travels between devices using cables.
Q:
Radio waves have more carrying capacity than microwaves.
Q:
Coaxial cables are bundles of thin tubes of glass that convert data into light pulses using lasers.
Q:
A repeater is a network device that demodulates signals.
Q:
Modulation means changing the characteristics of a signal, such as from analog to digital.
Q:
The device shown in the figure above is a wireless network card.
Q:
A gateway is used to connect two similar networks.
Q:
A logical address is built into the circuitry of a network device when it is manufactured.
Q:
Servers and workstations can both be considered to be nodes on a network.